Results 41 to 50 of about 171,486 (208)

XOR-Based (n, n) Visual Cryptography Schemes for Grayscale or Color Images with Meaningful Shares

open access: yesApplied Sciences, 2022
XOR-based Visual Cryptography Scheme (XOR-based VCS) is a method of secret image sharing. The principle of XOR-based VCS is to encrypt a secret image into several encrypted images, called shares.
Yu-Hong Chen, Justie Su-Tzu Juan
doaj   +1 more source

The secreted secret of PCSK9 [PDF]

open access: yesScience-Business eXchange, 2009
Amgen researchers have demonstrated that blocking secreted PCSK9 in mice and nonhuman primates lowers LDL cholesterol. The findings bolster the case for an antibody-based approach to blocking the protein, which is a genetically validated target for hypercholesterolemia.
openaire   +1 more source

Dynamic Multi-secret Sharing Scheme in Vector Space Without Trusted Center [PDF]

open access: yesJisuanji gongcheng, 2017
The existing secret sharing scheme in the vector space cannot achieve the secret share update or the dynamic addition and deletion of members,and it is hard to ensure the existence of trusted center,so a multi-secret sharing scheme without trusted center
WANG Yuli,DU Weizhang
doaj   +1 more source

A Novel Secret Sharing Method Based on Binary Sequence

open access: yesDianxin kexue, 2015
A novel secret sharing method was proposed based on binary sequence,which was quite different from the traditional secret sharing method.This secret sharing method was based on binary secret sequence using bit operations.The secret here included but not ...
Yexia Cheng   +5 more
doaj   +2 more sources

Efficient and Lossless Polynomial-Based Secret Image Sharing for Color Images

open access: yesIEEE Access, 2019
In today's era of developed network, it is particularly important to ensure the security of information. Secret image sharing is a kind of secret information protection technology with loss tolerance by sharing a secret image to a number of shadow images.
Qinghong Gong   +3 more
doaj   +1 more source

Design models of secret reconstruction towards rational users

open access: yesTongxin xuebao, 2021
Rational Secret Reconstruction is an intersection between traditional secret reconstruction and game theory, which aims to restrict the selfish behaviors of rational users, making both of them obtain the secret in real applications.However, when directly
Hai LIU   +4 more
doaj   +2 more sources

An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages

open access: yesIEEE Access, 2019
Secret sharing is one of the most important cryptographic primitives used for data outsourcing. The threshold-based secret sharing scheme is one of the well-known secret sharing schemes in cryptography.
Dong Chen, Wei Lu, Weiwei Xing, Na Wang
doaj   +1 more source

Key distribution and recovery algorithm based on Shamir's secret sharing

open access: yesTongxin xuebao, 2015
In Shamir's secret sharing scheme, the dealer divided the secret s into n shadows and distributed it to share-holders in such a way that any t or more than t shadows can recover this secret, while fewer than t shadows cannot obtain any information about ...
Hui-gui RONG   +4 more
doaj   +2 more sources

Unconditionally-secure ideal robust secret sharing schemes for threshold and multilevel access structure

open access: yesJournal of Mathematical Cryptology, 2013
An n-player -secure robust secret sharing scheme is a (t,n)-threshold secret sharing scheme with the additional property that the secret can be recovered, with probability at least , from the set of all shares even if up to t players provide incorrect ...
Jhanwar Mahabir P.   +1 more
doaj   +1 more source

The Secret Ingredient

open access: yesAMA Journal of Ethics, 2002
Little-known facts about food allergens, allergies, and labeling. Virtual Mentor is a monthly bioethics journal published by the American Medical Association.
openaire   +2 more sources

Home - About - Disclaimer - Privacy